A supply chain attack is an attack method that intervenes in the software development and distribution process, delivering malicious code to end users through legitimate updates or libraries.
Software development no longer takes place within a single organization. OSS libraries, CI/CD pipelines, package registries, code signing certificates — the entire path through which a product reaches end users constitutes the "supply chain," and attackers target the single most poorly defended point within it. What fundamentally distinguishes this from conventional attacks is that the victim organization is not directly compromised; instead, a trusted upstream provider is used as a stepping stone.
Because attacks travel through legitimate distribution channels, they are vastly more difficult to detect than the common web application vulnerabilities identified by OWASP. Backdoors embedded in signed updates can bypass endpoint protection, and it is not uncommon for cases to go undiscovered for months. On public registries such as npm and PyPI, typosquatting — the practice of publishing malicious packages under names that closely resemble legitimate ones — has been reported repeatedly. A single tainted library can propagate to thousands of projects; this amplification effect is the greatest threat posed by supply chain attacks.
In the context of DevSecOps, the foundational strategy is to incorporate dependency verification from the earliest stages of development, in line with the shift-left principle. The following approaches are becoming established practice:
In the author's experience, adopting an SBOM alone — simply by eliminating the state of "not knowing what is included" — dramatically accelerates the identification of blast radius when an incident occurs.
In systems that leverage LLMs, model weight files and training data also become part of the supply chain. A model fine-tuned on a poisoned dataset can generate unintended outputs through a vector entirely distinct from prompt injection. Verifying the trustworthiness of the AI supply chain is even more challenging than it is for conventional software, and the industry as a whole is still in the process of exploring countermeasures.



A2A (Agent-to-Agent Protocol) is a communication protocol that enables different AI agents to perform capability discovery, task delegation, and state synchronization, published by Google in April 2025.

Acceptance testing is a testing method that verifies whether developed features meet business requirements and user stories, from the perspective of the product owner and stakeholders.

AES-256 is the highest-strength encryption algorithm using a 256-bit key length within AES (Advanced Encryption Standard), a symmetric-key cryptographic scheme standardized by the National Institute of Standards and Technology (NIST).

A mechanism that controls task distribution, state management, and coordination flows among multiple AI agents.

Agent Skills are reusable instruction sets defined to enable AI agents to perform specific tasks or areas of expertise, functioning as modular units that extend the capabilities of an agent.